Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2013-2030

Back to Search

SUSE Linux Security Vulnerability: CVE-2013-2030

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:N)
Published
12/10/2013
Created
07/25/2018
Added
12/12/2013
Modified
07/04/2017

Description

keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.

Solution(s)

  • suse-upgrade-openstack-nova
  • suse-upgrade-openstack-nova-api
  • suse-upgrade-openstack-nova-cert
  • suse-upgrade-openstack-nova-compute
  • suse-upgrade-openstack-nova-doc
  • suse-upgrade-openstack-nova-network
  • suse-upgrade-openstack-nova-novncproxy
  • suse-upgrade-openstack-nova-objectstore
  • suse-upgrade-openstack-nova-scheduler
  • suse-upgrade-openstack-nova-test
  • suse-upgrade-openstack-nova-vncproxy
  • suse-upgrade-openstack-nova-volume
  • suse-upgrade-python-greenlet
  • suse-upgrade-python-greenlet-devel
  • suse-upgrade-python-nova

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;